Advances in Internet of Things

Volume 1, Issue 2 (July 2011)

ISSN Print: 2161-6817   ISSN Online: 2161-6825

Google-based Impact Factor: 2.8  Citations  

Side-Channel Analysis for Detecting Protocol Tunneling

HTML  Download Download as PDF (Size: 2424KB)  PP. 13-26  
DOI: 10.4236/ait.2011.12003    6,411 Downloads   16,069 Views  Citations

Affiliation(s)

.

ABSTRACT

Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. We first discuss the timing side channels that have been found in protocol tunneling tools. We then show how to infer Hidden Markov models (HMMs) of network protocols from timing data and use the HMMs to detect when protocols are active. Unlike previous work, the HMM approach we present requires no a priori knowledge of the protocol. To illustrate the utility of this approach, we detect the use of English or Italian in interactive SSH sessions. For this example application, keystroke-timing data associates inter-packet delays with keystrokes. We first use clustering to extract discrete information from continuous timing data. We use discrete symbols to infer a HMM model, and finally use statistical tests to determine if the observed timing is consistent with the language typing statistics. In our tests, if the correct window size is used, fewer than 2% of data windows are incorrectly identified. Experimental verification shows that on-line detection of language use in interactive encrypted protocol tunnels is reliable. We compare maximum likelihood and statistical hypothesis testing for detecting protocol tunneling. We also discuss how this approach is useful in monitoring mix networks like The Onion Router (Tor).

Share and Cite:

H. Bhanu, J. Schwier, R. Craven, R. Brooks, K. Hempstalk, D. Gunetti and C. Griffin, "Side-Channel Analysis for Detecting Protocol Tunneling," Advances in Internet of Things, Vol. 1 No. 2, 2011, pp. 13-26. doi: 10.4236/ait.2011.12003.

Cited by

[1] Side-Channel Security Analysis of Connected Vehicle Communications Using Hidden Markov Models
IEEE Transactions on …, 2022
[2] Network Traffic Obfuscation System for IIoT-Cloud Control Systems
2022
[3] Security Evaluation of a Dedicated Short Range Communications (DSRC) Application
2020
[4] Internet of Things and Intelligent Technologies for Efficient Energy Management in a Smart Building Environment
2018
[5] Review of Internet of Things (IoT) in Electric Power and Energy Systems
2018
[6] Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect
2018
[7] Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data
Proceedings of International Symposium on Sensor Networks, Systems and Security, 2017
[8] Hedgehog in the Fog: Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels
2016
[9] Side channel analysis of multiple PMU data in electric power systems
2015
[10] Cyber security in smart DC microgrid operations
2015
[11] A survey of electric power synchrophasor network cyber security
Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), 2014 IEEE PES, 2014
[12] A Normalized Statistical Metric Space for Hidden Markov Models
Cybernetics, IEEE Transactions on, 2013
[13] Network Traffic Analysis Using Stochastic Grammars
Dissertations, 2012
[14] Traffic analysis attacks on sensor networks
2012

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.